QUESTION 21Refer to the exhibit. What can be determined from this ping result?

A. The public IP address of cisco.com is 2001:420:1101:1::a.B. The Cisco.com website is down.C. The Cisco.com website is responding with an internal IP.D. The public IP address of cisco.com is an IPv4 address.

QUESTION 24What information from HTTP logs can be used to find a threat actor?

A. refererB. IP addressC. user-agentD. URL

Answer: C

QUESTION 25An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. Which term defines the initial event in the NIST SP800- 61 r2?

A. instigatorB. precursorC. online assaultD. trigger

Answer: D

QUESTION 26You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)